What You’ll Learn Here.
Responsible AI Governance
Cybersecurity for AI Systems
Risk & Compliance Frameworks (NIST, ISO, AIDA)
Digital Ethics & Leadership
BLOGS
News & Articles
-
CISA adds known exploited vulnerability to its catalog
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing rapid remediation of Vulnerabilities…
-
Several vulnerabilities in Google Chrome could allow arbitrary code execution
MS-ISAC NOTICE NUMBER:2026-023ISSUE DATE(S):03/13/2026PREVIEW:Several vulnerabilities have been discovered in Google Chrome, the most serious of which could allow the execution of arbitrary code. Successful exploitation…
-
Several vulnerabilities in Mozilla Firefox could allow arbitrary code execution
MS-ISAC NOTICE NUMBER:2026-022ISSUE DATE(S):03/10/2026PREVIEW:Several vulnerabilities have been discovered in Mozilla Firefox, the most serious of which could allow arbitrary code execution. Mozilla Firefox is a…
-
CISA adds five known exploited vulnerabilities to its catalog
CISA has added five new vulnerabilities to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. CVE-2017-7921 Multiple Hikvision Products Improper…













